Securing Media Hotspots

Establishing secure connection between 802.15.3 interface enabled devices with zero knowledge is a challenging issue. We call "media hotspot" geographic boundaries areas covered by a group of 802.15.3 enabled devices that offers media contents. This paper provides an efficient scheme for securing media hotspot. This scheme provides a zero knowledge cross-layer pairing protocol for 802.15.3 networks and a physical layer encryption model to encrypt messages at the physical layer. The protocol uses information-theoretic security.

[1]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[2]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Leslie Lamport,et al.  The temporal logic of actions , 1994, TOPL.

[5]  Tongtong Li,et al.  Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving , 2004 .

[6]  Tongtong Li,et al.  Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems , 2007, EURASIP J. Wirel. Commun. Netw..

[7]  Miguel R. D. Rodrigues,et al.  Information Theoretic Security for Wireless Channels-Theory and Practice , 2007 .

[8]  Sebastian Mödersheim,et al.  OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .

[9]  Khaled Masmoudi,et al.  Efficient Group Management For Inter-PN Access Control , 2007, 2007 IEEE International Conference on Communications.

[10]  Frédéric Lassabe,et al.  Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia Guide , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[11]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .

[12]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Tongtong Li,et al.  CDMA physical layer built-in security enhancement , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[16]  Zihua Guo,et al.  Piconet security in IEEE 802:15.3 WPAN , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[17]  J. Baylis Error-correcting Codes , 2014 .

[18]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[19]  Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers , 2003, IEEE Trans. Computers.

[20]  Aaron Earle Wireless Security Handbook , 2005 .

[21]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[22]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[23]  Frédéric Lassabe,et al.  A Friis-based calibrated model for WiFi terminals positioning , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[25]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..